Showing 1,501 - 1,520 results of 9,720 for search '"security"', query time: 0.09s Refine Results
  1. 1501
  2. 1502

    Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps by Yan Zhao, Shiming Li, Liehui Jiang, Tieming Liu

    Published 2019-04-01
    “…Thus, the proposed scheme is more desirable for securing communication in mobile networks.…”
    Get full text
    Article
  3. 1503

    RNA Biopesticides: A Cutting‐Edge Approach to Combatting Aquaculture Diseases and Ensuring Food Security by Qiu Li, Lixing Huang

    Published 2024-12-01
    “…With high specificity and minimal environmental impact, RNA biopesticides provide an innovative, sustainable approach to combating diseases in aquaculture, enhancing both food security and environmental safety.…”
    Get full text
    Article
  4. 1504
  5. 1505
  6. 1506

    On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys by Junghyun Nam, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, Dongho Won

    Published 2014-01-01
    “…Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. …”
    Get full text
    Article
  7. 1507
  8. 1508
  9. 1509
  10. 1510

    Memahami Dinamika Kerjasama Industri Pertahanan dalam Kerangka Indonesia Australia Defence Security Dialogue by Arfin Sudirman, Yusa Djuyandi, Fajri Syahal Guna Pratama

    Published 2023-01-01
    “…Industri pertahanan menjadi salah satu agenda penting dan menjadi perhatian, dimulai pada saat kabinet Indonesia Bersatu I dibawah Presiden Susilo Bambang Yudhoyono dan menjadikannya sebagai prioritas pembangunan dan memberi peluang besar bagi keterlibatan pihak swasta dalam kegiatan industri pertahanan salah satunya melalui agenda kerja sama yang dijalin oleh Indonesia dengan Australia dalam satu agenda dialog Indonesia – Australia Defense Security Dialogue (IADSD) yang telah dijalin dan disahkan oleh Lombok Treaty pada tahun 2006, yang mana Indonesia dalam hal ini memiliki kepentingan untuk meningkatkan kapabilitas serta kemandirian Industri pertahanan nasional. …”
    Get full text
    Article
  11. 1511

    Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network by Yinghui ZHANG, Lingyun HU, Yixin LI, Jianting NING, Dong ZHENG

    Published 2022-04-01
    “…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
    Get full text
    Article
  12. 1512
  13. 1513
  14. 1514

    A Topology Visualization Early Warning Distribution Algorithm for Large-Scale Network Security Incidents by Hui He, Guotao Fan, Jianwei Ye, Weizhe Zhang

    Published 2013-01-01
    “…It is of great significance to research the early warning system for large-scale network security incidents. It can improve the network system’s emergency response capabilities, alleviate the cyber attacks’ damage, and strengthen the system’s counterattack ability. …”
    Get full text
    Article
  15. 1515

    A security detection approach based on autonomy-oriented user sensor in social recommendation network by Shanshan Wan, Ying Liu

    Published 2022-03-01
    “…However, the characteristic of openness brings great hidden dangers to the security of recommender systems. Shilling attackers can change the recommendations by foraging user relationships. …”
    Get full text
    Article
  16. 1516

    Assessing Structural Components of Investment and Innovation Provision of Economic Security in the Basic Types of Economic Activity by Ruslan Kolishenko, Olya Ilyash, Ruslan Lupak, Iryna Dzhadan

    Published 2021-06-01
    “…The article shows the progressive and practical value of a structural approach to the evaluation of investment and innovation provision of economic security, including the basic types of economic activity. …”
    Get full text
    Article
  17. 1517

    Towards the Integration between IoT and Cloud Computing: An Approach for the Secure Self-Configuration of Embedded Devices by Antonio Puliafito, Antonio Celesti, Massimo Villari, Maria Fazio

    Published 2015-12-01
    “…The secure boot-up and setup of Internet of Things (IoT) devices connected over the Cloud represent a challenging open issue. …”
    Get full text
    Article
  18. 1518
  19. 1519

    Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique by Nithya Chidambaram, Pethuru Raj, K. Thenmozhi, Rengarajan Amirtharajan

    Published 2016-01-01
    “…The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. …”
    Get full text
    Article
  20. 1520